Bugbounty Tips
2.72K subscribers
80 photos
5 videos
13 files
83 links
research and sharing in cybersecurity
加入频道
For more join to channel (:

https://yangx.top/rootdr_research
🤣17👍2
https://evil.ir/blog?1%22%3C/script%3E%3Cscript%3Eeval(%22alert(document\x2ecookie)%22)%3C/script%3E



For more join to channel (:

https://yangx.top/rootdr_research


#Bugbounty
🔥9👎2👍1
https://x.com/R00TDR/status/1767123886745792692?t=9Gzo4chpc2XMIP02dDxNqA



دوستان توییتر منه اگه دوست داشتید دنبال کنین🙏
👎9👍6
https://challenginno.ir/

https://yangx.top/challenginno

یک پلتفرم آموزشی جذاب ایرانی دیگه
که بخش های مختلفی برای Blue/Red داره
چالش های جذابی داره (:


For more join to channel (:

https://yangx.top/rootdr_research
👍101👎1🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
حل چالش Trickster در PicoCTF
سعی کنید چالش رو حل کنید اول خودتون، خیلی ساده اس.

https://play.picoctf.org/practice/challenge/445



For more join to channel (:

https://yangx.top/rootdr_research
#web
#CTF
#writeup
👍4
https://site.ir/parameter/detail/?id=(select(0)from(select(sleep(5)))v)
🔥20
وقتی تیم فنی کمپانی بعد ۴۵ روز میاد میگه این گزارش قبلا توسط تیم امنیت داخلی پیدا شده.
🤣33🤔2
سلام
یک اسکریپت اتومات برای crawl و پیدا کردن unique پارامتر ها و پارامتر هایی که Reflect میشن نوشتم که برای پیدا کردن آسیب پذیری RXSS خیلی کمک میکنه،
با Star توی پروژه گیتهاب و انتشارش میتونید حمایت کنید❤️🙏
🔥171
ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET parameters, and tests them for reflected input. The tool helps bug bounty hunters and penetration testers quickly identify potential reflected XSS flaws, offering fast and reliable results.


Features
Crawls a target domain to discover all pages and GET parameters.
Tests each parameter to check if it's reflected in the response.
Outputs a list of reflected parameters for further exploitation.
Fast and optimized for bug bounty hunters.
Easy to use with minimal setup.


link:
https://github.com/rootDR/ex-param




For more join to channel :
https://yangx.top/rootdr_research



#Web
#Bugbounty
#Tools
🔥11👍2👎1👏1
🔖Ex-param - an automated tool designed for finding reflected parameters for XSS vulnerabilities

It crawls a target website, extracts GET parameters, and tests them for reflected input. The tool helps bug bounty hunters and penetration testers quickly identify potential reflected #XSS flaws, offering fast and reliable results.

⬇️Features
🔴Crawls a target domain to discover all pages and GET parameters.
🔴Tests each parameter to check if it's reflected in the response.
🔴Outputs a list of reflected parameters for further exploitation.
🔴Fast and optimized for bug bounty hunters.
🔴Easy to use with minimal setup.


📱Github: 🔗Link

#infosec #cybersecurity #bugbounty #pentest #bugbountyTips #bugbountyTools
🔹 Share & Support Us 🔹
📱 Channel : @Hide_Club
Please open Telegram to view this post
VIEW IN TELEGRAM
8
Bugbounty Tips
ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET parameters, and tests them for reflected input. The tool helps bug bounty hunters and penetration testers quickly identify…
🚀 New Update for Automated Reflected Parameter Finder Tool! 🔍

We've just made the tool even more user-friendly and powerful for penetration testers and security researchers! 🎯

Key Updates:
🏷 New -s Switch: Now you can specify the -s flag to include subdomains in the crawl. If this flag is omitted, the tool will only crawl the main domain — giving you better control over your scans.
🗂 Automatic File Organization: The tool now creates a dedicated folder for each target domain. All crawled pages and discovered parameters are saved neatly in the respective folder.
⚡️ Performance Boost: We've optimized the crawling speed to ensure faster results and a smoother experience while scanning for reflected parameters.
👁 Real-Time Feedback: See results as soon as a reflected parameter is found, reducing wait times and improving user experience.
💻 Check out the updated tool on GitHub and start scanning with even more precision! 🔥

How to Use:
-t (required): The target domain URL to crawl (e.g., https://example.com)
-s: Include subdomains in the crawl. If this flag is omitted, only the main domain is crawled.
🛠 Tools & Features:

Reflected parameter testing for XSS vulnerabilities
Subdomain crawling support
Real-time results & performance improvements
🔧 Try it now and enhance your web security scanning game!

👉 Follow me on Twitter and telegram for more updates: @R00TDR t.me/rootdr_research


#Web
#Bugbounty
#Tools
🔥41👍1